Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
disable_reconfigure_req.diff | Remove need to run reconfigure target =================================================================== |
Samuel Henrique <samueloph@debian.org> | not-needed | 2024-04-12 | ||
skip_devices_test.patch | Skip "devices" test as it fails on kfreebsd and hurd Error log: sent 160 bytes received 117 bytes 554.00 bytes/sec total size is 0 speedup is 0.00 check how the directory listings compare with diff: + + /<<PKGBUILDDIR>>/rsynctee -aii /<<PKGBUILDDIR>>/testtmp/devices/rsync.out --link-dest=/<<PKGBUILDDIR>>/testtmp/devices/to /<<PKGBUILDDIR>>/testtmp/devices/from/ /<<PKGBUILDDIR>>/testtmp/devices/chk/ rsync: failed to hard-link /<<PKGBUILDDIR>>/testtmp/devices/to/fifo with fifo: Invalid cross-device link (1073741842) cd ./ hD block hD block2 hD block3 hD block3.5 hD char hD char2 hD char3 cSc........ fifo rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1207) [sender=3.1.3] + cat + diff -u /<<PKGBUILDDIR>>/testtmp/devices/rsync.chk /<<PKGBUILDDIR>>/testtmp/devices/rsync.out /--- /<<PKGBUILDDIR>>/testtmp/devices/rsync.chk 2019-10-15 01:26:43.000000000 +0000 /+++ /<<PKGBUILDDIR>>/testtmp/devices/rsync.out 2019-10-15 01:26:43.000000000 +0000 @@ -6,4 +6,4 @@ hD char hD char2 hD char3 -hS fifo +cSc........ fifo + test_fail test 5 failed + echo test 5 failed test 5 failed + exit 1 /bin/fakeauth: Error 1 for child 7541 /bin/settrans: Error 1 for child 7540 ----- devices log ends FAIL devices |
Samuel Henrique <samueloph@debian.org> | no | 2024-04-12 | ||
env_shebang.patch | =?utf-8?q?Removes_usage_of_env_on_shebangs_as_per_Debian_Policy_?= =?utf-8?q?=C2=A7_10=2E4?= =================================================================== |
Samuel Henrique <samueloph@debian.org> | not-needed | 2024-04-12 | ||
fix_rrsync_man_generation.patch | Fix manpage installation for rrsync Otherwise we would get "ERROR: support/rrsync.1 cannot be created." I'm not confident this is the best approach on solving this issue, but I know this works with no regressions. This patch needs to be reviewed before being submitted to upstream. =================================================================== |
Samuel Henrique <samueloph@debian.org> | no | 2024-04-12 | ||
configure_ac_fix_failing_IPv6_check_due_to_missing_return_type.patch | [PATCH] configure.ac: fix failing IPv6 check due to missing return type Fixing this warning escalated to an error, resuting in no IPv6 support: ``` configure.sh:7679: checking whether to enable ipv6 configure.sh:7718: clang -o conftest -g -O2 -DHAVE_CONFIG_H -Wall -W conftest.c >&5 conftest.c:73:1: error: type specifier missing, defaults to 'int'; ISO C99 and later do not support implicit int [-Wimplicit-int] main() ^ int 1 error generated. configure.sh:7718: $? = 1 configure.sh: program exited with status 1 ``` |
Ivan Babrou <github@ivan.computer> | no | 2024-01-01 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12084/0001-Some-checksum-buffer-fixes.patch | [PATCH 1/2] Some checksum buffer fixes. - Put sum2_array into sum_struct to hold an array of sum2 checksums that are each xfer_sum_len bytes. - Remove sum2 buf from sum_buf. - Add macro sum2_at() to access each sum2 array element. - Throw an error if a sums header has an s2length larger than xfer_sum_len. |
Wayne Davison <wayne@opencoder.net> | no | 2024-10-29 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12084/0002-Another-cast-when-multiplying-integers.patch | [PATCH 2/2] Another cast when multiplying integers. | Wayne Davison <wayne@opencoder.net> | no | 2024-11-05 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12085/0001-prevent-information-leak-off-the-stack.patch | [PATCH] prevent information leak off the stack prevent leak of uninitialised stack data in hash_search |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-14 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12086/0001-refuse-fuzzy-options-when-fuzzy-not-selected.patch | [PATCH 1/4] refuse fuzzy options when fuzzy not selected this prevents a malicious server providing a file to compare to when the user has not given the fuzzy option |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-23 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12086/0002-added-secure_relative_open.patch | [PATCH 2/4] added secure_relative_open() this is an open that enforces no symlink following for all path components in a relative path |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-23 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12086/0003-receiver-use-secure_relative_open-for-basis-file.patch | [PATCH 3/4] receiver: use secure_relative_open() for basis file this prevents attacks where the basis file is manipulated by a malicious sender to gain information about files outside the destination tree |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-23 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12086/0004-disallow-.-elements-in-relpath-for-secure_relative_o.patch | [PATCH 4/4] disallow ../ elements in relpath for secure_relative_open | Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-26 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12087/0001-Refuse-a-duplicate-dirlist.patch | [PATCH 1/2] Refuse a duplicate dirlist. | Wayne Davison <wayne@opencoder.net> | no | 2024-11-14 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12087/0002-range-check-dir_ndx-before-use.patch | [PATCH 2/2] range check dir_ndx before use | Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-26 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12088/0001-make-safe-links-stricter.patch | [PATCH] make --safe-links stricter when --safe-links is used also reject links where a '../' component is included in the destination as other than the leading part of the filename |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-11-23 | ||
rsync-upstream-CVE-patches-v3/CVE-2024-12747/0001-fixed-symlink-race-condition-in-sender.patch | [PATCH] fixed symlink race condition in sender when we open a file that we don't expect to be a symlink use O_NOFOLLOW to prevent a race condition where an attacker could change a file between being a normal file and a symlink * Refresh patch to remove offset. |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-12-18 | ||
rsync-upstream-CVE-patches-v3/version_update/0001-raise-protocol-version-to-32.patch | [PATCH 1/3] raise protocol version to 32 make it easier to spot unpatched servers |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-12-10 | ||
rsync-upstream-CVE-patches-v3/version_update/0002-change-version-to-3.4.0.patch | [PATCH 2/3] change version to 3.4.0 * Change previous version from the patch, from "3.3.1dev" to "3.3.0" |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-12-18 | ||
rsync-upstream-CVE-patches-v3/version_update/0003-update-NEWS-for-3.4.0.patch | [PATCH 3/3] update NEWS for 3.4.0 * Update patch context since upstream had other staged entries and we are just cherry-picking the CVE fixes. |
Andrew Tridgell <andrew@tridgell.net> | no | 2024-12-18 | ||
Fix-FLAG_GOT_DIR_FLIST-collission-with-FLAG_HLINKED.patch | Fix FLAG_GOT_DIR_FLIST collission with FLAG_HLINKED fixes commit 688f5c379a43 (Refuse a duplicate dirlist.) |
Natanael Copa <ncopa@alpinelinux.org> | yes | debian upstream | https://github.com/ncopa/rsync/commit/efb85fd8db9e8f74eb3ab91ebf44f6ed35e3da5b | 2025-01-15 |
Fix_use-after-free_in_generator.patch | [PATCH] Fix use-after-free in generator full_fname() will free the return value in the next call so we need to duplicate it before passing it to rsyserr. |
Natanael Copa <ncopa@alpinelinux.org> | no | 2025-01-15 |